ARTIFICIAL INTELLIGENT INTRUSION DETECTION SYSTEMS: PERSPECTIVES OF INNOVATIVE TECHNOLOGIES
Abstract
The most popular development tools of the quantum cryptography technology are compared, the structure and the basic principles of its work is considered. In article the significance in the modern information society of the information resources requiring safe methods of protection against NSD is discussed. The structure and the basic principles of technology in the field of artificial intellectual system for detection of invasions and also a tendency of development of advanced developments innovative technologies of the system of detection of invasions is considered. Also describes the structure and basic principles of quantum cryptography technology based on properties of quantum systems. Quantum information are a physical quantity characterizing changes occurring in the system during the interaction between the information flow and the external environment. The exploratory development has been experimentally realized by the authors at the facility for multi-channel data transmission network within the grant program. The method of increase in level of information security and protection of confidential information by development innovative is offered technology of the system of detection of invasions. In the article a method of increasing the level of information security and the protection of confidential information by the quantum artificial intellectual systems of quantum channels communication are considered.
References
2. Bezobrazov, S.V., Golovko V. A. Artificial immune systems for protection of information: detection and classification of computer viruses//Materials of Vseross. Naych.confernce Neyroinformatika, MEPhI, Moscow, 20-23 January. 2008. – Moscow, 2008. – 23-28 pp.
3. Bezobrazov S.V. Artificial immune systems for information security: application of LVQ network//Neuroinformatics-2007: materials IX of Vseross. science – tech. conference, Moscow, MEPhI, 2007, 27-35 pp.
4. Bezobrazov S.V., Golovko V. A. Artificial immune systems for information security: detection and classification of computer viruses//Neuroinformatics-2008. – Moscow, MEPhI, 2008. –23-27 pp.
5. Aktayeva A. and etc. Security of information: using of quantum technologies//International Journal of Open Information Technologies. – vol 4, №. 4, 2016, 40-48 pp. – www.injoit.org
6. Aktayeva A.U., Ilipbayeva L.I. Innovative technologies in an information security system: quantum technologies//Modern innovative technologies and IT education. -2014, vol 1, №1(9), 320-326 pp.
7. Sandpiper of Page. Classical cryptography//Photonics 2010,2, 36-41 pp.
8. Holevo A. S Mathematical fundamentals of quantum informatics. – M.:2016, 125 p.
9. Kurochkin V.L. Experimental installation for quantum cryptography with the single polarized photons//Magazine of technical physics, 2005, V.75, №6.
10. Glushchenko L.A., Morgunov K.K. Cost of information security in laser communication lines// URL: http://www.oop-ros.org/maket2012/part1/ref1_2/1.3.2.pdf (circulation date 01.10.2017)
11. D. F. lugger. Artificial intelligence, strategy and methods of the solution of complex problems. – M.: Williams, 2003, 864 p.
12. Russell S. and etc. Artificial intelligence: modern approach. – M.: Williams, 2007, 1408 p.
13. Gorodetski V.I., Kotenko I.V., Karsaev O. Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning//International Journal of Computer Systems Science & Engineering. – 2003. – № 4,191-200 pp.
14. www.comsec.spb.ru
15. http://www.securitylab.ru/contest/299868.php (circulation date 01.10.2017)
16. Aeppli G., Rosenbaum T. Quantum Annealing and Related Optimization Methods. – Heidelberg: Springer Verlag, 2007, vol 679, 159-169 pp.
17. Altaisky M., Rao V. Inverted Mexican Hat Potential in Activation of Receptor Cells // Nonlin. Analysis B, 2009, vol 10, № 5, 2961-2970 pp.
18. Beck F. Synaptic Quantum Tunnelling in Brain Activity//Neuroquantology. 2008, vol 6, №. 2, 140-151pp.
19. Beck F., Eccles J. Quantum Aspects of Brain Activity and the Role of Consciousness// PNAS.1992, vol 89, 11357-11361 pp.
20. Behera L., Kar I., Elitzur A. A Recurent Quantum Neural Network Model to Describe Eye Tracking of Moving Targets// Found. Phys. Lett. 2005, vol 18, № 4, 357-370 pp.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Publication policy of the journal is based on traditional ethical principles of the Russian scientific periodicals and is built in terms of ethical norms of editors and publishers work stated in Code of Conduct and Best Practice Guidelines for Journal Editors and Code of Conduct for Journal Publishers, developed by the Committee on Publication Ethics (COPE). In the course of publishing editorial board of the journal is led by international rules for copyright protection, statutory regulations of the Russian Federation as well as international standards of publishing.
Authors publishing articles in this journal agree to the following: They retain copyright and grant the journal right of first publication of the work, which is automatically licensed under the Creative Commons Attribution License (CC BY license). Users can use, reuse and build upon the material published in this journal provided that such uses are fully attributed.